This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيدThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيدThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
اقرأ المزيدThis book summarizes important developments in telecommunications, including SS7 over IP, with a focus on SS7 network reliability.
اقرأ المزيدWith the advent of the Digital Library initiative, web document processing and biometric aspects of digital document processing, ...
اقرأ المزيدWith the advent of the Digital Library initiative, web document processing and biometric aspects of digital document processing, ...
اقرأ المزيدThis book analyzes the dynamics and impacts of software development and discusses new institutional and economic changes ...
اقرأ المزيدIf you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers ...
اقرأ المزيدThis two-volume set LNCS 12198 and 12199 constitutes the thoroughly refereed proceedings of the 11th International Conference ...
اقرأ المزيدThis two-volume set LNCS 12198 and 12199 constitutes the thoroughly refereed proceedings of the 11th International Conference ...
اقرأ المزيدThis volume consists of three parts. The first part contains the papers/abstracts of the invited talks, the second part contains ...
اقرأ المزيدThis volume consists of three parts. The first part contains the papers/abstracts of the invited talks, the second part contains ...
اقرأ المزيدThis book constitutes the proceedings of the 17th International Conference on Distributed Computing and Internet Technology, ...
اقرأ المزيدThe book covering the areas of algorithms, applications, and systems, thus bridging the gap between theory and practice and ...
اقرأ المزيدThe book covering the areas of algorithms, applications, and systems, thus bridging the gap between theory and practice and ...
اقرأ المزيدThe book constitutes the refereed proceedings of the First International Conference on Distributed Computing in Sensor Systems, ...
اقرأ المزيدThe book constitutes the refereed proceedings of the Second International Conference on Distributed Computing in Sensor Systems, ...
اقرأ المزيدThe book constitutes the refereed proceedings of the 4th International Conference on Distributed Computing in Sensor Systems, ...
اقرأ المزيدThere are many applications that require parallel and distributed processing to allow complicated engineering, business and ...
اقرأ المزيدThis publication discusses exclusionary rules in different criminal justice systems. It is based on the findings of a research ...
اقرأ المزيد